The Legal Compass for Unified Communications

Unified communications challenge companies to navigate an increasing portfolio of laws governing content, monitoring and interception of communications and accessing stored records. Courts are also challenging the use of effective security on new UC solutions. Learn more in this valuable webcast.

Just when corporations began to stabilize their IT services, an explosion of new technologies emerge--economically compelling, but presenting general counsel with new legal complexities. This program outlines key strategies for managing the legal risks of doing business “in the cloud” as privacy and e-discovery collide with “unified communications“, VoIP, email-to-voice mail, etc.

E-discovery presents new challenges when discovery procedures collide against legal privacy requirements and the increased use of cloud computing solutions. Learn what these challenges are, and emerging business and technology solutions for achieving compliance

E-Discovery is creating enormous new forces upon limited corporate resources, yet vendors, law firms and consultants continue to resist delivering functional, responsive solutions to the real problems inside companies. This provocative keynote reveals 10 critical truths regarding the current market, and how companies must respond in order to truly gain control of their organizations and their information.

Unified communications challenge companies to navigate an increasing portfolio of laws governing content, monitoring and interception of communications and accessing stored records. Courts are also challenging the use of effective security on new UC solutions. Learn more in this valuable webcast.

E-Discovery is proving to be the litmus test for evaluating whether IT governance is actually working. Learn the critical questions that e-discovery requires to be answered, and how to leverage e-discovery to launch and improve IT governance projects and programs.

Security professionals are squarely on the firing line as courts increasingly demand that digital evidence--including e-mail--be authentic and reliable in order to be admitted into the court. THIS PROGRAM HAS BEEN RESCHEDULED FROM FEBRUARY 10 DUE TO PERSONAL ILLNESS.

Echelon One CEO Bob West interviews Jeffrey Ritter, Esq., the author of a new book on the critical e-discovery questions, and uncovers the critical defensive strategies to be employed.

Until now, no tools have emerged that allow lawyers, IT professionals, records managers and e-discovery specialists to literally see their challenges--and plan their success! THIS BROADCAST IS BEING RESCHEDULED TO FEB. 20 DUE TO PERSONAL ILLNESS

This webcast introduces the CastleQuest Discovery Maps and how they are being used to transform the strategies and battle plans of today's e-discovery challenges.

Learn from Jeffrey Ritter, the creator of the CastleQuest Discovery Library, 10 winning strategies for how the CastleQuest Maps can deliver the path forward.

Understanding the critical business impacts of e-discovery is vital -- this program enables information security professionals to learn how to show new value for their programs and reduce e-discovery risks.

Based on the nationally recognized best-seller, this program surveys the critical importance of evaluating the e-discovery capabilities of outside law firms and the economic risks of making the wrong choice. 13 key topics to investigate through dialogue and competitive bidding are reviewed. Extensive audience questions are encouraged!

Information Security professionals are increasingly asked to play critical roles in responding to legal requests for electronic records and information. Learn five key strategies for being prepared to perform your role--and survive the maelstroms of the e-discovery storms.